A method, such as for executing electronic financial transactions, is disclosed herein. The method can include arranging an automated bank terminal and a bank core in communication with one another over a secured internal bank network. The method can also include receiving, at the automated bank terminal, a banking transaction request from a user wherein the banking transaction request is defined by a plurality of transaction details. The method can also include directing, with the automated bank terminal, the banking transaction request to a partner switch outside of the secured internal bank network in response to receiving the banking transaction request.
|
1. A method comprising:
arranging an automated bank terminal and a bank core both of a first bank in communication with one another over a secured internal bank network;
receiving, at the automated bank terminal, a banking transaction request from a user having an account with the first bank wherein the banking transaction request is thus an on-us transaction and is defined by a plurality of transaction details;
designating, with the automated bank terminal, the banking transaction request as an off-us transaction irresponsive to the banking transaction actually being an on-us transaction;
directing, with the automated bank terminal, the banking transaction request to a partner switch outside of the secured internal bank network in response to said receiving the banking transaction request and after said designating;
converting, with the partner switch, the banking transaction request received from the automated bank terminal and designated as off-us to a force-post transaction; and
directing, with the partner switch, the banking transaction request back into the secured internal bank network after said converting.
2. The method of
arranging a switch and the bank core in communication with one another over the secured internal bank network; and
receiving, with the switch, the banking transaction request in the form of the force-post transaction defined by at least some of the plurality of transaction details and originating at the partner switch after said directing the banking transaction to the partner switch.
3. The method of
receiving, with the switch, the banking transaction request in the form of the force-post transaction over one of an electronic funds transfer (EFT) network and an automated clearing house (ACH) network distinct from the secured internal bank network.
4. The method of
directing, with the automated bank terminal, the banking transaction request to the partner switch over one of an electronic funds transfer (EFT) network and an automated clearing house (ACH) network outside of the secured internal bank network.
5. The method of
6. The method of
directing, with the automated bank terminal, the banking transaction request over the secured internal bank network to a teller computing device before said directing the banking transaction request to the partner switch; and
receiving, at the teller computing device, an approval input corresponding to approval of the banking transaction request before said directing the banking transaction request to the partner switch.
7. The method of
directing, with the automated bank terminal, the banking transaction request over a secured internal bank network to a teller computing device including a tablet computer.
8. The method of
receiving, at a second automated bank terminal, a second banking transaction request from a second user wherein the second banking transaction request is defined by a second plurality of transaction details;
directing, with the second automated bank terminal, the second banking transaction request over the secured internal bank network to the tablet computer;
receiving, at the tablet computer, a second approval input corresponding to approval of the second banking transaction request; and
directing, with the second automated bank terminal, the second banking transaction request to the partner switch.
9. The method of
accessing, with the teller computing device, the bank core over the secured internal bank network prior to said receiving the approval input.
10. The method of
executing, with the automated bank terminal, the banking transaction request substantially contemporaneously with said directing the banking transaction request to a partner switch outside of the secured internal bank network.
|
This application is a continuation of U.S. patent application Ser. No. 15/909,544, filed Mar. 1, 2018, which is hereby incorporated in its entirety. This application also claims priority to and the benefit of U.S. Provisional Patent Application No. 62/465,472 filed Mar. 1, 2017, which is hereby incorporated by reference in its entirety.
The present disclosure relates to systems for executing electronic financial transactions.
Recent technological advancements related to In-Lobby Teller (ILT) terminals have empowered consumers to interact with banking branches in new ways. While this opportunity enhances efficiency, it sometimes can be at the cost of consumer acquisition, engagement, and retention. Newer ILTs offer enhanced solutions. They combine the speed and accuracy of a self-service terminal with intelligence from a bank's core systems. For example, the Diebold Nixdorf 9900 ILT links to the staff within the bank to provide around-the-clock service for many types of transactions, provide a diverse range of services to individuals, and fulfill the needs of many small and medium businesses.
An ILT can have a flexible and modular design for enhanced functionality and can be designed to meet international accessibility guidelines. Some ILTs may have a nineteen inch color touchscreen consumer-viewable display with privacy filter and have both landscape and portrait display options as well as optional video enablement with Concierge Video Services™. Other options may be desirable such as having a cash capacity with a recycling module with up to five cassettes for denomination support and enhanced cash capacity, up to 10,800-note capacity for recycling, deposits of up to 11,500 notes in a five-cassette configuration, up to four cassettes to dispense or recycle (fifth cassette reserved for mix of deposit and reject/dispense retracts), and/or have a pocket-style user interface that accepts 200 notes at one time. Some units may have an optional Advanced Function Dispenser (AFD) the enables fast dispensing and holds an additional 13,000-note capacity and five denominations. ILT may be capable of advanced features such as a barcode reader and coin dispenser, an intelligent depository module for configuration flexibility, and capacity to accept stacks of up to 30 checks or bill payment documents in any insertion orientation.
The background description provided herein is for the purpose of generally presenting the context of the disclosure. Work of the presently named inventors, to the extent it is described in this background section, as well as aspects of the description that may not otherwise qualify as prior art at the time of filing, are neither expressly nor impliedly admitted as prior art against the present disclosure.
A method, such as for executing electronic financial transactions, can include arranging an automated bank terminal and a bank core in communication with one another over a secured internal bank network. The method can also include receiving, at the automated bank terminal, a banking transaction request from a user wherein the banking transaction request is defined by a plurality of transaction details. The method can also include directing, with the automated bank terminal, the banking transaction request to a partner switch outside of the secured internal bank network in response to receiving the banking transaction request.
According to other features, the method can also include arranging a switch and the bank core in communication with one another over the secured internal bank network. The method can also include receiving, with the switch, a force-post transaction defined by at least some of the plurality of transaction details and originating at the partner switch after the directing of the banking transaction to the partner switch. The receiving the force-post transaction can be further defined as receiving, with the switch, the force-post transaction over one of an electronic funds transfer (EFT) network and an automated clearing house (ACH) network distinct from the secured internal bank network. The method can also include converting, with the partner switch, the banking transaction request to the force-post transaction after the directing of the banking transaction to the partner switch and prior to the receiving the force-post transaction with the switch. The method can also include designating, with the automated bank terminal, the banking transaction request as an off-us transaction prior to the directing of the banking transaction request to the partner switch, wherein the designating is irresponsive to the plurality of transaction details and wherein the plurality of transaction details of the force-post transaction includes the off-us designation.
In other features, the method can also include converting, with the partner switch, the banking transaction request to a force-post transaction defined by at least some of the plurality of transaction details after the directing of the banking transaction to the partner switch. The method can also include directing, with the partner switch, the force-post transaction to the secured internal bank network after the converting. The method can also include tagging, with the automated bank terminal, the banking transaction request as an off-us transaction prior to the directing of the banking transaction request to the partner switch outside of the secured internal bank network in response to the receiving the banking transaction request, the tagging irresponsive to the plurality of transaction details. The directing of the banking transaction to the partner switch can be further defined as directing, with the automated bank terminal, the banking transaction request to the partner switch over one of an electronic funds transfer (EFT) network and an automated clearing house (ACH) network outside of the secured internal bank network.
According to additional features, the plurality of transaction details include at least one of the group including a transaction amount, one or more bank accounts, a personal identification number, a current image of user, an image of a driver's license, and a bank routing number. The method can also include directing, with the automated bank terminal, the banking transaction request over the secured internal bank network to a teller computing device before the directing the banking transaction request to the partner switch. The method can also include receiving, at the teller computing device, an approval input corresponding to approval of the banking transaction request before the directing the banking transaction request to the partner switch. The directing of the banking transaction request to the teller computing device can be further defined as directing, with the automated bank terminal, the banking transaction request over a secured internal bank network to a teller computing device including a tablet computer.
According to other features, the method can also include receiving, at a second automated bank terminal, a second banking transaction request from a second user wherein the second banking transaction request is defined by a second plurality of transaction details. The method can also include directing, with the second automated bank terminal, the second banking transaction request over the secured internal bank network to the tablet computer. The method can also include receiving, at the tablet computer, a second approval input corresponding to approval of the second banking transaction request. The method can also include directing, with the second automated bank terminal, the second banking transaction request to the partner switch. The method can also include accessing, with the teller computing device, the bank core over the secured internal bank network prior to the receiving the approval input. The method can also include executing, with the automated bank terminal, the banking transaction request substantially contemporaneously with the directing the banking transaction request to a partner switch outside of the secured internal bank network.
A method, such as for executing electronic financial transactions, can include receiving, at an automated bank terminal, a banking transaction request from a user wherein the banking transaction request is defined by a plurality of transaction details. The method can also include directing, with the automated bank terminal, the banking transaction request over a secured internal bank network to a teller computing device. The method can also include receiving, at the teller computing device, an approval input corresponding to approval of the banking transaction request. The method can also include directing, with one of the automated bank terminal and the teller computing device, the banking transaction request to a partner switch outside of the secured internal bank network in response to the receiving the approval input.
In other features, the method can also include arranging a switch and a bank core in communication with one another and with the teller computing device and the automated bank terminal over the secured internal bank network. The method can also include receiving, with the switch, a force-post transaction defined by at least some of the plurality of transaction details after the directing of the banking transaction to the partner switch. The method can also include directing, with the switch, the force-post transaction to the bank core over the secured internal bank network after the receiving of the force-post transaction from the partner switch. The method can also include directing, with the bank core, a confirmation message to the switch over the secured internal bank network after the directing of the force-post transaction to the bank core from the switch. The confirmation message can correspond to recordation of the force-post transaction in the bank core. The method can also include directing, with the switch, the confirmation message outside of the secured internal bank network.
According to additional features, the method can also include receiving, with the automated bank terminal, the confirmation message from outside of the secured internal bank network. The method can also include executing, with the automated bank terminal, the banking transaction request in response to the receiving the confirmation message from outside of the secured internal bank network.
A system, such as for executing electronic financial transactions, can include a bank core having one or more processors and configured maintain a primary ledger of a plurality of accounts and transactions associated with the plurality of accounts. The system can also include an automated bank terminal having one or more processors and configured to receive a banking transaction request from a user. The banking transaction request can be defined by a plurality of transaction details. The automated bank terminal can be configured to transmit the banking transaction request for eventual receipt by the bank core of the plurality of transaction details. The system can also include a secured internal bank network, wherein the bank core and the automated bank terminal directly input at least some communications to the secured internal bank network. The system can also include a partner switch having one or more processors and disposed outside of the secured internal bank network and in communication with the automated bank terminal and configured to receive the banking transaction request from the automated bank terminal and also configured to convert the banking transaction request to a force-post transaction defined by at least some of the plurality of transaction details.
According to other features, the system can also include a switch having one or more processors and configured to direct electronic communications relative to the secured internal bank network and also to receive and output electronic communications relative to one or more financial transaction networks external to the secured internal bank network. The switch can be further configured to receive the force-post transaction from the partner switch over the one or more financial transaction networks external to the secured internal bank network. The switch can be further configured to transmit the force-post transaction to the bank core over the secured internal bank network. The switch can be further configured to transmit a confirmation of the force-post transaction to the partner switch over the one or more financial transaction networks external to the secured internal bank network.
In other features, the system can also include a teller computing device having one or more processors and disposed to communicate with the switch and the automated bank terminal over the secured internal bank network. The teller computing device can be configured to receive the banking transaction request from the automated bank terminal over the secured internal bank network. The teller computing device can also be configured to receive an approval input corresponding to approval of the banking transaction request. The teller computing device can be configured to direct the approval input to the automated bank terminal.
The detailed description set forth below references the following drawings:
The present disclosure, as demonstrated by the exemplary embodiment described below, can provide systems and methods for executing electronic financial transactions that improve the computing efficiencies of existing systems. Efficiency relates to the relationship between the accomplishment of a task and the resources required to accomplish the task. Improvements in efficiency are defined when the resources required to perform the task are reduced and also when relatively greater or additional tasks can be accomplished without supplementing resources or with minimal additions to resources.
The inventors have observed that the costs associated with improvements in banking technology often include variable costs and fixed costs. The inventors have further observed that variable costs are defined, by way of example and not limitation, by the cost of automated bank terminals such as ILTs and automated transaction machines (ATMs). The cost of automated bank terminals is variable, based on the number of terminals purchased and the extent of functionality of each automated bank terminal. The inventors have further observed that fixed costs are defined, by way of example and not limitation, by the cost of setting up new technology to function with existing, or “legacy” systems. Set-up can require extensive reprogramming and testing for validation.
The inventors have further observed that, for many banks, the extent of fixed costs can preclude the deployment of new technology. The present disclosure discloses improvements in the efficiency of banking systems. The present disclosure discloses new methods of operating components within a banking system that increases the functionality of the bank system. The present disclosure also discloses new methods of operating components outside of an internal banking system that increases the functionality of the bank system.
The present disclosure provides a method and system with the enhanced functionality associated with ILTs without requiring significant changes to existing bank computing system. Transactions are routed out of the internal bank network and directed back into the internal bank core. An automated bank terminal, such as an ILT, can receive a banking transaction request from a user. Prior to being routed out of the internal bank network, the banking transaction request can be tagged or designated as an off-us transaction by the automated bank terminal. The banking transaction request can be directed to a partner switch that is disposed outside of the internal bank network. The partner switch can convert the banking transaction request to a force-post transaction and then direct the force-post transaction back into the internal bank core. By so designating and converting the transaction, the existing bank computer network can accept and execute the transaction. Conversely, modifying an existing bank computer system to accept the same banking transaction request “directly” through the internal bank network (directly between an ILT and the bank core) would require setup costs of over one million dollars.
The ILT 3 includes one or more processors and a variety of different banking transaction requests may be input to the ILT or automated bank terminal 3 by a user 4. A banking transaction request is schematically illustrated and referenced at 2 in
The teller terminal/teller PC 5 is in general a personal computer that may be a laptop, a desktop, or a tablet. Alternatively, the teller terminal 5 may be an iPad type of device, a handheld device, or another device that is capable of permitting a bank teller 6 to approve/override a banking transaction request 2 that a banking user 4 is attempting to enter and process at the ILT 3. In the example system 1, the teller terminal 5 may be at least partially under the control of the teller application 9 running on the teller application server 7. The teller computing device 5 has one or more processors and is disposed to communicate with the switch 13 and the ILT 3 over the secured internal bank network 12. The teller application 9 may detect banking request transactions 2 that are entered into the ILT 3 by a user 4 and that have exceeded a threshold value, such as a $5,000 limit for a cash withdrawal (e.g., debit), and then forward these transactions 2 to the teller terminal 5. The teller terminal 5 and the teller application 9 (e.g., teller software) provide screens/menus prompting and allowing the bank teller 6 the option of approving or rejecting a particular banking transaction request 2 exceeding the threshold limit. In some embodiments, the teller application 9 may provide audit support with reporting capability of transactions such as when a teller approves or disapproves of various transactions.
The first bank switch 13 and, in general, the partner switch 11 receives transaction requests/messages/data blocks/packets of data and determines where they should be routed in order to reach their intended destination(s). The switches 11 and 13 can be substantially similar in terms of structure and differentiated by programming. The off-site partner switch 11 can be a certified banking switch that has a verifiable reliability for routing electronic financial transactions. The first bank switch 13 may loosely operate similar to a telephone switch and route data blocks based on their destination address. Those of ordinary skill in the art will appreciate that over time lookup-tables of destination address may be matched with paths onto which they may be routed to reach those destinations. Existing, known switches will not transmit transaction requests/messages/data blocks/packets of data that re-enter the secured internal bank network 12 from which it originated. However, the switch 13 according to the present disclosure will transmit transaction requests/messages/data blocks/packets of data sent to the partner switch 11 from the ILT 3 and then routed back into the secured internal bank network 12 by the partner switch 11. For example, messages leaving the secured internal bank network 12 from the ILT 3 and received by the partner switch 11 are received back into the secured internal bank network 12 by the switch 13.
In some embodiments of the present disclosure, the teller application 9 is able to handle typical teller control functions such as signature card verification. An off-us user with an on-us item (e.g., check) may require authentication to be performed through an embodiment of the teller application 9 that compares signatures, an image of the user against the physical appearance of the user at the ILT 3, and/or other biometric data. In some embodiments of the present disclosure, the teller application 9 can detect false identifications. Rather than utilize a human teller for completing a relatively small loan application, the first bank 18 can direct at least some users to begin or completely fill out necessary forms electronically at the ILT 3 before subsequently involving a human teller.
In general, the bank core 15 includes central databases so that accurate account balances are maintained. These databases of various account information may reside within the bank core 15 on multiple servers and/or other computing devices. Thus, the bank core 15 can have one or more processors and be configured to maintain a primary ledger of a plurality of accounts and transactions associated with the plurality of accounts. As illustrated in
In general, the ATM 17 is a traditional ATM where banking transactions may be conducted that generally have a lower threshold limit than the ILT 3. For example, cash withdrawals at the ATM 17 may not exceed $500.
In other operating scenarios, the external switch logic 535 of the external-partner switch 511 can send the banking transaction request to the second bank 519 when the banking transaction is in fact off-us and associated with the second bank 519. For example, the second bank 519 may be requested to approve/confirm a signature on a check that is presented at the first bank 518 as part of the banking transaction request. The check may be associated with an account that is maintained by the first bank 518 while the user and his/her signature is associated with a banking account maintained by the second bank 519.
In method 600, an off-site partner switch, such as any of partner switches 11, 311, 411, or 511, re-routes an off-us banking transaction request, such as request 2, back into a secured internal bank network, such as secured internal bank network 12, that the banking transaction request originated from. At 602, a banking transaction request is received by the first bank from a user. The exemplary banking transaction request requires approval of a teller, but other banking transaction requests may not require approval of a teller.
With reference again to
At 604 in
At 606 in
In one or more embodiments of the present disclosure, the teller terminal 5 allows a human bank teller 6 to approve user-entered banking transactions requests entered at more than one automated bank terminals. A second banking transaction request from a second banking customer can be received at a second automated bank terminal, wherein the second banking transaction request is defined by a second plurality of transaction details. The second automated bank terminal can direct the second banking transaction request over the secured internal bank network 12 to the tablet computer 5 of the human teller. The tablet computer can receive a second approval input corresponding to approval of the second banking transaction request, the second approval input entered by the human teller.
The approval input can be communicated back to the ILT 3 from the teller computing device. With reference again to
The exemplary ILT 3 does not send the banking transaction request 2 to the human bank teller when no approval is needed. By way of example and not limitation, if the banking transaction request 2 is a deposit including cash and/or a check the ILT 3 does not send the banking transaction request 2 to the human bank teller. Other examples of banking transaction requests that may not require approval include a withdrawal under a predetermined limit, a withdrawal under a predetermined limit in which the user request a particular combination of bills, or a payment of a bill. Such requests can be designated as an off-us transaction by the ILT 3 and directed to the partner switch 11 upon entry. Further, the ILT 3 can execute such a banking transaction request substantially contemporaneously with directing the banking transaction request to the partner switch 11. Substantially contemporaneously refers to the executing of the banking transaction request and the directing occur at generally the same time or occur sequentially. The automated bank terminal need not wait to execute the requested transaction for approval from the bank core if the details of the transaction do not require prior approval.
In one or more embodiments of the present disclosure, the teller application server 7 may tag the banking transaction request 2 as approved by the bank teller 6 with a tag that may include a record of which teller approved the banking transaction request 2, what action the teller approved, and/or what time and date the banking transaction request 2 was approved. When the teller approves the banking transaction request 2, systems according to one or more embodiments may assign a teller approval code that identifies the teller that approved the banking transaction. In other configurations, the teller application server 7 stores a name of an approving teller, an approval time and date, and/or an action taken by the approving teller.
At 608 in
At 610 in
At 612 of
Prior to directing the banking transaction request back to the secure internal bank network, the partner switch 611 converts the banking transaction request to the force-post transaction. The force-post transaction is defined by at least some of the plurality of transaction details that defined the banking transaction request, such the amount of the transaction, the implicated account(s), the relevant PIN, etc. The details of the force-post transaction include the off-us designation that was assigned to the banking transaction request prior to its transmission to the partner switch. The conversion of the banking transaction request to a force-post transaction facilitates processing of the banking transaction request without significant modifications to legacy systems. Force Post messaging allows the partner switch 611 to “approve” the transaction. This format ensures the bank switch will accept the teller approved transaction. This allows a self service device like the ILT to do teller transactions without having to make expensive changes directly to the core and/or the teller platform.
At 614 of
The local bank switch, 13 or 313, can transmit the off-us, force-post banking transaction request after receipt to the bank core 15 or 315 over the secured internal bank network 12 or 312. With reference again to
At 616 of
At 618 of
At 620 of
It is noted that more than one bank may share the partner switch 11. It is also noted that the partner switch 11 may be owned by a third-party that may not be a single bank. This may be especially useful and cost effective for small banks with few branch offices because the partner switch eliminates the complexity of completely updating the software, message protocols, and/or other features of the first bank switch 13 to allow the first bank switch 13 to communicate with the ILT 3, as well as multiple ILTs. With a partner switch 11, the ILT 3 communicates directly with the partner switch 11 without the need of having the partner switch 11 or the ILT 3 needing to communicate with other legacy devices such as first bank switch 13 using legacy message formats, communication formats and protocols, and using legacy SW. Thus, the partner switch hardware can come with a connection to a network provider that will route on-us transactions back to the first bank core 15 with minimal or, in some cases, zero changes to in-house processing by the first bank.
In one or more embodiments of the present disclosure, the systems 1, 31, 301 of
In one or more embodiments of the present disclosure, checks may be imaged by the ILT. Checks, deposits and the like may also be imaged when used to receive funds, deposit funds, or perform authentications. At the time of imaging, Magnetic Ink Character Recognition (MICR) lines on the check may be read by MICR strip readers and routing numbers may be determined from the check and/or captured image(s).
It can be desirable to verify an identity of the user. For example, the first bank, via the ILT and/or teller application server, can first attempt to verify an identity of the user with the records held by the first bank. One exemplary approach to verifying the user is by comparing a photograph of the user on a state-issued identification with a current image of the user. A camera located near the ILT can capture a first picture of the user. The ILT can then acquire a second picture of the user from a controlled source. For example, the controlled source may be a government-issued identification. The ILT may then verify the user by determining if the user is the person in the picture of the government-issued identification. Of course, other verifications can include verifying a signature of the user.
With reference again to
The second bank can respond to the authentication message with an authentication response message. At 710, the authentication response message is received at a core of the first bank. With reference again to
After the core performs any necessary operations related to the message, the authentication response message is sent to the ILT at 712. With reference again to
At 806, an attempt is made to verify the identity of the user within the first bank. This may be done by capturing a first picture of the user and comparing it to a second picture of the user that is recovered from a controlled source. The controlled source may be a government issued identification. When the user has not been verified by the first bank, a verification request is sent to the second bank at 808 to verify the identity of the user. A verification response is received by the first bank from the second bank at 810. When the user has been verified by one of the first and second banks, the ILT sends the check cashing request with the approval tag as an off-us request to the partner switch at 812. The check cashing request is received at the core of the first bank from the partner switch at 814. The core at least partially processes the check cashing request at 816, to create a core-processed cashing-request. The core-processed cashing-request is returned to the partner switch at 818. The core-processed cashing-request is returned to the ILT of the first bank at 820. The core-processed cashing-request is processed to completion by the ILT of the first bank by presenting funds to the user 822.
An attempt is made to verify an identity of the user within the first bank at 906. When the user has not been verified by the first bank, the core of the first bank sends a verification request to the second bank at 908, to verify the identity of the user. A verification response is received from the second bank at 910. When the user has been verified, the first transaction request with the approval tag is sent as an off-us request, at 912, from the partner switch to the first bank. Prior to 912, the banking transaction request was sent to the partner switch from the ILT.
The banking transaction request is received by the first bank from the partner switch and at least partially processed at 914 to create an off-us second banking transaction request. The off-us second banking transaction request is transmitted from the first bank to the partner switch at 916. The second banking transaction request is sent, at 918, to the second bank and, at least partially, processed at the second bank. The second banking transaction request is processed by accessing an account of the user to produce a receipt message at 920. The receipt message is sent from the second bank to the partner switch at 922. The receipt message is sent from the partner switch to the first bank at 924. The receipt message is processed, at 924, to close out the banking transaction.
Generally describing an example configuration of the computer 1100, the processor 1102 may be a variety of various processors including dual microprocessor and other multi-processor architectures. The memory 1104 can store a process 1114 and/or the data 1116, for example. The memory 1104 may include volatile memory and/or non-volatile memory. The non-volatile memory may include, for example, ROM, programmable read only memory (PROM), EPROM. The volatile memory may include, for example, RAM, synchronous random access memory (SRAM), dynamic random access memory (DRAM), synchronous dynamic random access memory (SDRAM), double data rate synchronous dynamic random access memory (DDR SDRAM), direct Rambus random access memory (DRRAM) and the like.
A disk 1106 may be operably connected to the computer 1100 via, for example, an input/output interface (e.g., card, device) 1118 and the input/output port 1110. The disk 1106 may be, for example, a magnetic disk drive, a solid state disk drive, a floppy disk drive, a tape drive, a Zip drive, a flash memory card, and/or a memory stick. Furthermore, the disk 1106 may be a compact disc-ROM (CD-ROM), a compact disk (CD) recordable drive (CD-R drive), a CD rewriteable drive (CD-RW drive), and/or a digital video ROM drive (DVD ROM). The disk 1106 and/or the memory 1104 can store an operating system that controls and allocates resources of the computer 1100.
The bus 1108 may be a single internal bus interconnect architecture and/or other bus or mesh architectures. While a single bus is illustrated, it is to be appreciated that the computer 1100 may communicate with various devices, logics, and peripherals using other busses (e.g., PCIE, SATA, Infiniband, 1384, USB, Ethernet). The bus 1108 can be types including, for example, a memory bus, a memory controller, a peripheral bus, an external bus, a crossbar switch, and/or a local bus.
The computer 1100 may interact with input/output devices via the input/output interfaces 1118 and the input/output ports 1110. Input/output devices may be, for example, a keyboard, a microphone, a pointing and selection device, cameras, video cards, displays, the disk 1106, the network devices 1120, and so on. The input/output ports 1110 may include, for example, serial ports, parallel ports, universal-serial bus (USB) ports and the like.
The computer 1100 can operate in a network environment and thus may be connected to the network devices 1120 via the input/output interfaces 1118, and/or the input/output ports 1110. Through the network devices 1120, the computer 1100 may interact with a network. Through the network, the computer 1100 may be logically connected to remote computers. Networks with which the computer 1100 may interact include, but are not limited to, a local area network (LAN), a wide area network (WAN), and other networks. The networks may be wired and/or wireless networks.
Embodiments of the present disclosure can include apparatuses, methods, and computer program products. Accordingly, embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.), or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “module” or “system.” Furthermore, embodiments may take the form of a computer program product embodied in any tangible medium of expression having computer-usable program code embodied in the medium. Any combination of one or more computer-usable or computer-readable media may be utilized. For example, a computer-readable medium may include one or more of a portable computer diskette, a hard disk, a random access memory (RAM) device, a read-only memory (ROM) device, an erasable programmable read only memory (EPROM) device, a portable compact disc read-only memory (CD ROM), an optical storage device, and a magnetic storage device. Computer program code for carrying out operations may be written in any combination of one or more programming languages.
“Processor” and “Logic”, as used herein, includes but is not limited to hardware, firmware, software and/or combinations of each to perform a function(s) or an action(s), and/or to cause a function or action from another logic, method, and/or system. For example, based on a desired application or need, logic and/or processor may include a software-controlled microprocessor, discrete logic, an application specific integrated circuit (ASIC), a programmed logic device, a memory device containing instructions or the like. Logic and/or processor may include one or more gates, combinations of gates, or other circuit components. Logic and/or a processor may also be fully embodied as software. Where multiple logics and/or processors are described, it may be possible to incorporate the multiple logics and/or processors into one physical logic (or processors). Similarly, where a single logic and/or processor is described, it may be possible to distribute that single logic and/or processor between multiple physical logics and/or processors.
While the present disclosure has been set forth with reference to exemplary embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the present disclosure. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the present disclosure without departing from the essential scope thereof. Therefore, it is intended that the present disclosure not be limited to the particular embodiments disclosed, but that the present disclosure will include all embodiments falling within the scope of the appended claims. The right to claim elements and/or sub-combinations that are disclosed herein is hereby unconditionally reserved. The use of the word “can” in this document is not an assertion that the subject preceding or following the word is unimportant or unnecessary or “not critical” relative to anything else described in this document. The word “can” is used herein in a positive and affirming sense and no other motive should be presumed. More than one “invention” may be disclosed in the present disclosure; an “invention” is defined strictly by the content of a patent claim and not by what is written in a detailed description of an embodiment of an invention.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
8020757, | Sep 20 2005 | FCTI, INC | Multiple financial institution automated teller machine apparatus, system and method for using same |
8112330, | Aug 07 1997 | CITICORP CREDIT SERVICES, INC USA | System and method for delivering financial services |
20060026099, | |||
20080093441, | |||
20080126245, | |||
20090032579, | |||
20090313129, | |||
20120150708, | |||
20140129439, | |||
20140337221, | |||
20150178697, | |||
20160019510, | |||
20160321626, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Nov 11 2013 | CAPPELLI, TOM | PHOENIX INTERACTIVE DESIGN, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048041 | /0759 | |
Nov 10 2017 | HEILIG, ROY | Diebold Nixdorf Incorporated | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048359 | /0121 | |
Dec 28 2017 | PHOENIX INTERACTIVE DESIGN, INC | Diebold Nixdorf Incorporated | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048319 | /0468 | |
Jan 16 2019 | Diebold Nixdorf, Incorporated | (assignment on the face of the patent) | / | |||
Jul 20 2020 | Diebold Self-Service Systems | U S BANK TRUSTEES LIMITED | SECURITY INTEREST NOTES | 053271 | /0067 | |
Jul 20 2020 | DIEBOLD NIXDORF, INCORPORATED F K A DIEBOLD, INCORPORATED | U S BANK TRUSTEES LIMITED | SECURITY INTEREST NOTES | 053271 | /0067 | |
Jul 20 2020 | Diebold Self-Service Systems | U S BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT | SECURITY INTEREST NOTES | 053270 | /0783 | |
Jul 20 2020 | DIEBOLD NIXDORF, INCORPORATED F K A DIEBOLD, INCORPORATED | U S BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT | SECURITY INTEREST NOTES | 053270 | /0783 | |
Jul 20 2020 | Diebold Self-Service Systems | JPMORGAN CHASE BANK, N A,, AS ADMINISTRATIVE AGENT | SECURITY INTEREST SUPPLEMENT | 053268 | /0908 | |
Jul 20 2020 | DIEBOLD NIXDORF INCORPORATED F K A DIEBOLD, INCORPORATED | JPMORGAN CHASE BANK, N A,, AS ADMINISTRATIVE AGENT | SECURITY INTEREST SUPPLEMENT | 053268 | /0908 | |
Dec 29 2022 | JPMORGAN CHASE BANK, N A , AS AGENT | DIEBOLD NIXDORF, INCORPORATED F K A DIEBOLD, INCORPORATED | RELEASE OF SECURITY INTEREST IN PATENTS INTELLECTUAL PROPERTY | 062338 | /0429 | |
Dec 29 2022 | JPMORGAN CHASE BANK, N A , AS AGENT | Diebold Self-Service Systems | RELEASE OF SECURITY INTEREST IN PATENTS INTELLECTUAL PROPERTY | 062338 | /0429 | |
Dec 29 2022 | DIEBOLD SELF-SERVICE SYSTEMS, AS GRANTOR | GLAS AMERICAS LLC, AS THE SUCCESSOR AGENT | NOTICE OF SUCCESSOR AGENT AND ASSIGNMENT OF SECURITY INTEREST INTELLECTUAL PROPERTY - EUR NOTES | 062308 | /0587 | |
Dec 29 2022 | DIEBOLD NIXDORF, INCORPORATED, AS GRANTOR | GLAS AMERICAS LLC, AS THE SUCCESSOR AGENT | NOTICE OF SUCCESSOR AGENT AND ASSIGNMENT OF SECURITY INTEREST INTELLECTUAL PROPERTY - EUR NOTES | 062308 | /0587 | |
Dec 29 2022 | U S BANK TRUSTEES LIMITED, AS RESIGNING AGENT | GLAS AMERICAS LLC, AS THE SUCCESSOR AGENT | NOTICE OF SUCCESSOR AGENT AND ASSIGNMENT OF SECURITY INTEREST INTELLECTUAL PROPERTY - EUR NOTES | 062308 | /0587 | |
Dec 29 2022 | DIEBOLD SELF-SERVICE SYSTEMS, AS GRANTOR | GLAS AMERICAS LLC, AS THE SUCCESSOR AGENT | NOTICE OF SUCCESSOR AGENT AND ASSIGNMENT OF SECURITY INTEREST INTELLECTUAL PROPERTY - USD NOTES | 062308 | /0499 | |
Dec 29 2022 | Diebold Nixdorf, Incorporated | GLAS AMERICAS LLC, AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT - SUPERPRIORITY | 062299 | /0618 | |
Dec 29 2022 | Diebold Nixdorf, Incorporated | GLAS AMERICAS LLC, AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT - TERM LOAN | 062299 | /0717 | |
Dec 29 2022 | Diebold Nixdorf, Incorporated | GLAS AMERICAS LLC, AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT - 2026 NOTES | 062299 | /0794 | |
Dec 29 2022 | Diebold Nixdorf, Incorporated | JPMORGAN CHASE BANK, N A , AS COLLATERAL AGENT | SECURITY INTEREST ABL | 062250 | /0387 | |
Dec 29 2022 | U S BANK NATIONAL ASSOCIATION, AS THE RESIGNING AGENT | GLAS AMERICAS LLC, AS THE SUCCESSOR AGENT | NOTICE OF SUCCESSOR AGENT AND ASSIGNMENT OF SECURITY INTEREST INTELLECTUAL PROPERTY - USD NOTES | 062308 | /0499 | |
Dec 29 2022 | DIEBOLD NIXDORF, INCORPORATED, AS GRANTOR | GLAS AMERICAS LLC, AS THE SUCCESSOR AGENT | NOTICE OF SUCCESSOR AGENT AND ASSIGNMENT OF SECURITY INTEREST INTELLECTUAL PROPERTY - USD NOTES | 062308 | /0499 | |
Jun 05 2023 | JPMORGAN CHASE BANK, N A | Diebold Nixdorf, Incorporated | TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS | 064021 | /0405 | |
Jun 05 2023 | GLAS AMERICAS LLC | Diebold Nixdorf, Incorporated | TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS R F 062299 0618 | 064008 | /0852 | |
Aug 11 2023 | Diebold Nixdorf, Incorporated | GLAS AMERICAS LLC, AS COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 066545 | /0078 | |
Aug 11 2023 | GLAS AMERICAS LLC, AS COLLATERAL AGENT | Diebold Nixdorf, Incorporated | TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS 2025 USD NOTES REEL FRAME 053270 0783 | 064642 | /0001 | |
Aug 11 2023 | GLAS AMERICAS LLC, AS COLLATERAL AGENT | Diebold Nixdorf, Incorporated | TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS 2025 EUR NOTES REEL FRAME 053271 0067 | 064641 | /0836 | |
Aug 11 2023 | GLAS AMERICAS LLC, AS COLLATERAL AGENT | Diebold Nixdorf, Incorporated | TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS NEW TERM LOAN REEL FRAME 062299 0717 | 064642 | /0288 | |
Aug 11 2023 | GLAS AMERICAS LLC, AS COLLATERAL AGENT | Diebold Nixdorf, Incorporated | TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS 2026 NOTES REEL FRAME 062299 0794 | 064642 | /0202 | |
Feb 13 2024 | Diebold Nixdorf, Incorporated | PNC Bank, National Association | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 066599 | /0767 | |
Feb 13 2024 | Diebold Self-Service Systems | PNC Bank, National Association | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 066599 | /0767 |
Date | Maintenance Fee Events |
Jan 16 2019 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
Jun 28 2025 | 4 years fee payment window open |
Dec 28 2025 | 6 months grace period start (w surcharge) |
Jun 28 2026 | patent expiry (for year 4) |
Jun 28 2028 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jun 28 2029 | 8 years fee payment window open |
Dec 28 2029 | 6 months grace period start (w surcharge) |
Jun 28 2030 | patent expiry (for year 8) |
Jun 28 2032 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jun 28 2033 | 12 years fee payment window open |
Dec 28 2033 | 6 months grace period start (w surcharge) |
Jun 28 2034 | patent expiry (for year 12) |
Jun 28 2036 | 2 years to revive unintentionally abandoned end. (for year 12) |